A) Spam B) Viruses C) Spyware D) Malware
A) All of the above B) A phase in the Middle Ages C) The current era characterized by the use of digital technologies D) A term reffering to the Stone Age
A) Larged-sized computer hardware B) Extremely large physical documents C) Massive datasets that require advanced analytics D) Extremely large physical documents
A) 2000 B) 2005 C) 2001 D) 2003
A) Social Networking B) Video Sharing Sites C) Blogs D) Wikis
A) Ada Lovelace B) John von Neumann C) Grace Hopper D) Charles Babbage
A) Babbage B) Byron C) Edison D) Mauchly
A) Calculator B) Computer C) Telephone D) Analytical Engine
A) The latest version of internet browsers B) A network of interconnected smart devices that communicate and share data C) The internet used exclusively for gaming D) A type of computer programming language
A) Fishing B) Phishing C) Hacking D) Clicking
A) Improved user control over device functionalities B) Excessive device durability C) Limited data storage capabilities D) Unauthorized access to personal data
A) Internet of Things B) Blockchain Data C) Augmented Reality D) 5G
A) Slower response time in emergencies B) Improved patient care and treatment options C) Limited access to medical information D) Increased paperwork and administrative tasks
A) Decreased options for entertainment B) Enabled on-demand and personalized entertainment choices C) Increased cost of entertainment D) Limited access to movies and music
A) Facebook B) Instagram C) Tiktok D) Twitter
A) None of the above B) Social Constructivism C) Technological Determinism D) Technological Change
A) Led to economic recession B) Enhanced productivity and efficiency C) Slowed down economic growth D) Increased unemployment rates
A) Reclusion temporal B) Prison mayor C) Reclusion temporary D) Prison major
A) Cloud Computing B) Automation C) Virtual Reality D) Wi-Fi Eavesdropping
A) All of these B) Through wired telephone lines C) Through postal mail D) Wirelessly through the internet
A) Pretending to be someone else in online forums B) Stealing someone's personal information to impersonate them for fraudulent purposes C) Creating fake social media profiles D) A harmless online park
A) Malware B) Virus C) Spyware D) Worms
A) Using a combination of uppercase, lowercase, numbers, and symbols B) Using the same password across multiple accounts C) Using the same password across multiple accounts D) Regularly changing passwords every few years
A) Incompatibility with modern networks B) Lack of device connectivity C) Vulnerabilities in IoT device security D) Excessive power consumption
A) To confuse the recipient B) To make the message longer C) To show off one's technical skills D) To convey emotion or tone in text-based conversation
A) Artificial Intelligence B) Augmented Reality C) Virtual Reality D) Internet of Things
A) Can help people to communicate trough online games B) Reduced personal interaction C) Increase in access to information and services that has accompanied the growth of the internet D) Students can access teaching materials from all over the world
A) 2008 B) 2014 C) 2023 D) 2020
A) Through wired telephone lines B) Wirelessly through the internet C) Through postal mail D) Wirelessly through the internet
A) Technological Change B) Technological Determinism C) None of the above D) Social Constructivism
A) Ransomware B) Spyware C) Trojan Horses D) Spam
A) Grace Hopper B) John Mauchly C) Blaise Pascal D) Charles Babbage
A) Wi-Fi Eavesdropping B) Trojan Horses C) Worms D) Viruses
A) Communication of things B) Internet devices C) Communication devices D) Internet of Things
A) Z1 B) ED1 C) AI D) 5G
A) Malware B) Spamming C) Pharming D) Phishing
A) Work from outside of the Country B) All of the above C) Teleworking (Work from Home) D) Work inside the Company
A) They are always detected and prevented by antivirus software B) They attempt to trick individuals into revealing sensitive information C) They involve physical break-ins D) They are always detected and prevented by antivirus software
A) Republic Act No. 10175 Cybercrime Prevention Act of 2012 B) Republic Act No. 10173 Data Privacy Act of 2013 C) Republic Act No. 10173 Data Privacy Act of 2012 D) Republic Act No. 10175 Cybercrime Prevention Act of 2013
A) Timothy John Berners-Lee B) Mark Zuckerberg C) Jack Dorsey D) Vinton Gray
A) Adware B) Trojan Horse C) Ransomware D) Spyware
A) Web 3.0 B) Web 1.0 C) Web 2.0 D) Web 1.1
A) Petroglyphs B) Phoenician Alphabet C) Papyrus Plant D) Abacus
A) Dataset B) Data Communication C) Data transmission D) Database
A) Unauthorized access to personal data B) Improved user control over device functionalities C) Excessive device durability D) Limited data storage capabilities
A) Standard printer B) Smart thermostat C) Basic mobile phone D) Traditional desktop computer
A) No impact on the environment B) Decreased use of natural resources C) Positive contribution to environmental conservation D) Increased pollution and waste
A) Fast downloading of files B) Conducting online surveys C) Securing online transactions D) Real-time data transmission of audio or video content
A) Virtual Reality B) Augmented Reality C) Blockchain Data D) Augmented Virtual
A) Blockchain Communication B) Blockchain Reality C) Blockchain Data D) Blockchain Message
A) 2023 B) 2020 C) 2014 D) 2008
A) Increased travel time to physical classrooms B) Improved access to a variety of learning materials C) Decreased access to educational resources D) Limited interaction with teachers
A) Virtual Reality B) Wi-Fi Eavesdropping C) Cloud computing D) Automation
A) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive B) All of the above C) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods D) Helps people live and work smarter, as well as gain complete control over their lives
A) Because of many modern technologies B) All of the above C) Because of the new gadget that will be released D) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses
A) Viruses B) Malware C) Identity theft D) Hacking
A) Improved data-driven decision-making through analytics B) All of the above C) Decreased need for strategic planning D) Increased reliance on intuition
A) Mainframe computing B) Blockchain C) Cloud computing D) Analog computing
A) To increase vulnerability to cyber attacks B) To teach hacking techniques C) To raise awareness about potential internet threats and safe online practices D) To promote ethical hacking practices
A) File server B) Policy server C) Mailserver D) Application server
A) Never, because it's not important in the Digital world B) Only when communicating with close friends C) Only when writing formal emails D) Always, to ensure clarity and professionalism
A) Child Pornography B) Cyberbullying C) Cybersex D) Cyber Defamation
A) HTTPS B) SSH C) FTP D) IPsec
A) Penalty atleast Php 200,000 and or prison mayor B) Penalty atleast Php 500,000 and or prison mayor C) Penalty atleast Php 5,000 D) Prison mayor only
A) Internet Service Provider B) Internet Support Program C) Internet Security Protocol D) Internet Search Provider
A) Networking and Technology B) Internet and Etiquette C) None of the above D) Network and Etiquette
A) Penalty at least Php 500, 000 and or prison mayor B) Penalty of 20,000 C) Penalty of 1 year of imprisonment or prison mayor D) Penalty of 6-12 years of imprisonment or prison mayor
A) Computer Addiction B) Copyright infringement C) Piracy D) Plagiarism
A) A social media platform B) A type of computer virus C) A social media platform D) A set of rules for polite and respectful behavior on the Internet
A) Prison mayor B) Reclusion temporal C) Reclusion temporary D) Prison major
A) The sender is shouting or being rude B) The email is spam and should be deleted C) The sender is emphasizing the importance of the email D) The email contains confidential information
A) A software that provides free services B) A software that provides free services C) Malicious software that encrypts a victims data and demands a ransom for its release D) A legitimate form of remote work
A) eBay B) YouTube C) Facebook D) Amazon
A) Byt B) Byte C) Bait D) Bit
A) Nonprofit Website B) Media Website C) Personal Website D) Educational Website
A) Browser B) Server C) DNS D) IP address
A) The science of artificial intelligence B) The practice of securing computer systems and networks from cyber threats C) The study of the stock market D) A type of computer game
A) Thou shall avoid eye contact B) Thou shall be prompt C) Thou shall be prompt D) Thou shall respect personal space
A) Wordpress B) Pinterest C) Tumbler D) Blogger |